Vulnerability Notification: Microsoft Office Remote Code Execution

[Overview] Microsoft Office is an office software developed by Microsoft Corporation that can perform word processing, form editing, slide show production, and Email service. Recently, Microsoft fixed a remote code execution vulnerability in it. [Vulnerability Details] CVE-2018-8161: The vulnerability is caused by Outlook’s incorrect parsing of HTML. The vulnerable condition occurs when a MIME message…

New Release of Hillstone Server Breach Detection System 2.6

Because cybersecurity is a constant beast, Hillstone continuous to update solutions to address these types of malware and their variants. Today, Hillstone delivers a new version of the Server Breach Detection System (sBDS) 2.6, with enhanced detection capability for ransomware, mining malware and botnet. In addition, a new Threat Topology is added for additional insights….

A ransomware variant is spreading – Hillstone has established a solid shield!

Recently, the GandCrab ransomware family has widely spread in China. The databases, pictures, documents, and compressed files on infected hosts are encrypted, causing a shutdown of business systems. Since its discovery in January, GandCrab has spread rapidly, with many variations in less than one year, showing how active and aggressive the ransomware developers are. China…

Releasing Hillstone CloudView 2.6

Hillstone is releasing an update to CloudView, with more added intelligence. With version 2.6, customers can now more effectively and conveniently monitor their network through the CloudView mobile app. These new features especially benefit customers in the SMB segment, as well as universities and franchises. Highlights and Benefits: Supports threat intelligence query service: security admins…

Micro-segmentation – The solution for security and management in virtual environments

Every day we hear, see or read in the news that a new cyber attack has hit the headlines, affecting busineses small and large, across the world. The penalty is usually ransom in exchange for releasing their data. This has naturally made organizations more concerned about the security of their data, who have taken the…